Raise awareness of environmental health issues in order to better protect our children and future generations.

EMF Studies

15 February 2017

There is No S for Security in IoT

"The equipment on the lower-end of the scale, like a nanny cam, is most likely rushed through production – with the only requirement being that the equipment functions as advertised with little to no effort spent on reliability and security (despite the claims on the box)."

Notice that it isn't called IoTS. Security is something that is missing from the Internet of Things equation

You do not have a cell phone, you have a computer in your pocket that can make phone calls; you no longer drive a car, you are driving in a computer whose computer case is shaped like a car and is designed for transportation. The same can be said about thermostats, X-ray machines and yes – security camera systems. We now know these internet-connected devices as the ‘The Internet of Things’ (IoT) and we in IT have a joke about it.

“What does the “S” in IoT stand for?”

“There isn’t an “s” in IoT.”“Exactly.”

“S” is for Security

With the quality varying in the vast array of IoT devices, there is plenty of low hanging fruit for bad guys to take advantage of. Usually, this means hackers taking control of a device so they can add it to their ‘zombie’ network of infected, remote controlled Internet devices. You may have heard of this before, it is called a botnet. Remember when Twitter, Netflix, CNN, and Reddit went down late last October? That was a botnet.

“P” is for Protected

To address the security of your network, answer these two questions:How do we ensure that none of your equipment would become part of an infected botnet?How do we protect your office network from the bot-nets that already exist?

I previously mentioned that the bad guys go for the low hanging fruit. What does this look like? Take network-based, wireless security cameras for example – aka “nanny cams”. You can find these devices ranging in price and quality from $35 to well over $2000. Parallel to this large span of pricing lies a huge difference in features, and quality.

When we focus on quality there are certainly the physical tangibles: ability to withstand abuse, quality control of the product before it leaves the manufacturer, quality of the lenses and the image the camera takes. However, what is frequently overlooked by the consumer is the quality of the intangibles: quality code (code that is secure, stable, and frequently updated).

You Get What You Pay For

The equipment on the lower-end of the scale, like a nanny cam, is most likely rushed through production – with the only requirement being that the equipment functions as advertised with little to no effort spent on reliability and security (despite the claims on the box).

If you happen to purchase such equipment – you alone would be responsible for visiting the manufacturer’s website to download and install firmware updates for security – and that is assuming the manufacturer even releases security updates. This kind of sloppy security can lead to hackers watching your nanny cam feed – even if it is password protected. Effective security and automatic updates are what companies pay for when they purchase more expensive network equipment.

The Cost of Security

A deep investment in network security means your servers are protected with patch management, the routers are the only equipment directly connected to the internet, monitored, and the firmware is upgraded regularly of each device monitored remotely. The rest of your equipment, access points and switches are commercial grade, also monitored, and not directly connected to the internet so if they were to get infected, it would have to be an ‘inside job’.

Now that we know what is necessary to prevent your equipment from being infected, let’s focus on the second half – how do we protect your already healthy network from the millions of infected devices on the internet? By putting all your equipment behind a firewall so the outside world cannot directly communicate with them.

Long story short, when it comes to your IoT, YOU are responsible for adding the “S”.

Josh Erdman of TekTegrity has been in IT since 1997 and never leaves behind an opportunity to learn something new. He is a true ‘Jack of all trades’, a skill he taps into with his consulting, as he is always on the lookout for new ways to merge technology with business processes. In his spare time, Josh jumps into any opportunity to present technology and science to kids and loves public speaking.

No comments:

Post a Comment

Search This Blog

HELLO

My name is Meris. Through these articles, I would like to raise awareness of health and environment issues in order to better protect ourselves, our children and future generations. See also my Website in French Mieux Prévenir.

EVENTS

1. Global Expansion of the Wireless: The 5G dive into the great unknown, Brisbane, Australia, Free public lecture by Adj. Prof. Dariusz Leszczynski, Univ. of Helsinki, 17 August 2017, 6 pm. See here for details.

Followers

Follow by Email

Follow via RSS feed

Disclaimer

The opinions expressed by this site are not necessarily those of its creator. While the creator of the site makes every effort to present current and accurate information, the site may contain outdated material. All information provided is for information purposes only and is not intended to replace medical advice offered by a physician or other health professionals. The creator of the site is not liable for any damage or loss related to accuracy or completeness of information.